Skip to Main Content
Police Digital Service National Standards
Authentication failed. Please enable browser cookies and try again.
Sign In
Email Address
Password
Caps Lock is on.
Log in
Sign up
Forgot Password
Standards search - National Standard Microsite
Standards
Search Everything
Standards search
APIs
Blueprints
Procurement
About
Updates
FAQs
Contact Us
Status
Draft (6)
Live (171)
Retired (102)
Clear All
Classification
Reference Data / Templates (13)
Policy (24)
Principles (28)
Standards (120)
Guidance (94)
Clear All
Grade: PMR
false (217)
true (62)
Clear All
Grade: LMR
false (242)
true (37)
Clear All
Internally Amended / Developed
false (212)
true (67)
Clear All
Categories
Security (168)
Incident, Crime and Records Management (25)
Data (21)
Devices (17)
Forensics (17)
Intelligence Systems (17)
Operational Policing (12)
Criminal Justice (12)
Analytics (11)
Mobile Applications (7)
Clear All
Tags
ncsp (73)
cyber (58)
standard (47)
risk (41)
operational policing (36)
sbd (25)
resilience (24)
assurance (23)
network (22)
compliance (21)
See more
licenced-standard (20)
cyber attack (19)
security (18)
investigation (16)
images and video (15)
accreditation (15)
intelligence (14)
cjs (13)
coordination (13)
application (12)
Clear All
Sign in
to add a new content
Newest
A-Z
List
Grid
No entries were found.
DDL search listings
IDENT1
This document should be used in reference to the appropriate legislation, such as the Protection of Freedoms Act 2012: DNA & Fingerprint Provisions IDENT1 is the UK’s nationals automated...
Standard
|
Published:
01/01/2019
|
Authoring body:
Home Office
Reference Data / Templates
ICT Asset Recovery Standard 7.0
Asset Disposal & Information Security Alliance (ADISA) is an organisation designed to improve risk management and data protection within business processes for IT asset retirement and disposal....
Standard
|
Published:
01/01/2020
|
Authoring body:
Asset Disposal & Information Security Alliance (ADISA)
Standards
Cyber Essentials guidance
Most cyber attacks are conducted by unskilled individuals and are very basic in nature and cyber security is an important aspect to guard any organisation from cyber attacks. There are five...
Standard
|
Published:
01/01/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Principles (Version 1.0)
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Guidance 2
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution. Modern smartphones, laptops and tablets provide users with great flexibility and...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Secure Sanitisation of Storage Media (Version 1.0)
Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data. Data sanitisation has to...
Standard
|
Published:
13/02/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
10 Steps to Cyber Security
This guidance is designed to help organisations protect themselves in cyberspace and best practises for cyberspace security. It relays the task of defending your networks, systems and...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Application Development
This guidance gives practical advice on the secure development, procurement and deployment of generic applications. There are three types of common security issues: Secure data handling ...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
End user device (EUD) Security Guidance Windows 10 1809
This guidance covers the deployment of a range of end user device platforms for the secure configuration of Windows 10 1809. Risk owners and administrators should agree a configuration which...
Standard
|
Published:
01/01/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
End User Device (EUD) Security Guidance
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber security Centre (NCSC)
Principles
Defence Industry Security Notices
Industry Security Notices (ISNs) A Industry Security Notice (ISN) is an official document that tells people in industry about important instructions, guidance or other information relating...
Standard
|
Published:
01/01/2021
|
Authoring body:
Government Digital Services (GDS)
Guidance
ISO/IEC 27031:2011 IT Security Techniques — Guidelines for Information and Communication Technology Readiness for Business Continuity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2011
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27033-1:2015 IT Security Techniques — Network Security — Part 1: Overview and Concepts
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 20000-1:2018 IT Service Management — Part 1: Service Management System Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2018
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27018:2019 IT Security Techniques — Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds acting as PII Processors
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2019
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27004:2016 IT Security Techniques — Information Security Management — Monitoring, Measurement, Analysis and Evaluation
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2016
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2012
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO 22301:2019 Security and Resilience — Business Continuity Management Systems — Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2019
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27013:2015 IT Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27034-2:2015 IT Security techniques - Application Security - Part 2: Organisation Normative Framework
This document provides a framework for application security. ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27002:2013 IT Security techniques - Code of Practice for Information Security Controls
This document informs the implementation of controls within an information security management system based on ISO 27001. ISO (the International Organisation for Standardisation) and IEC (the...
Standard
|
Published:
01/01/2013
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27001:2013 IT Security techniques — Information Security Management Systems — Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2013
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27003:2017 Information Technology — Security techniques — Information Security Management Systems — Guidance
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2017
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27000:2020 IT Security techniques - Information Security management systems - Overview & Vocabulary
The International Organisation Standardisation (ISO) and the International Electrotechnical Commission (IEC) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2020
|
Authoring body:
International Organisation Standardisation (ISO)
Standards
National Intelligence Model
The National Intelligence Model (NIM) is a well-established model within the policing world that was established in 2000 by the National Criminal Intelligence service (NCIS) and adopted by...
Standard
|
Published:
01/01/2005
|
Authoring body:
Home Office
Standards
ISO/IEC 27003:2017 Preview
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2017
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO 17025:2017 General requirements for the competence of testing and calibration laboratories
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. BSI provide the...
Standard
|
Published:
01/01/2017
|
Authoring body:
International Standards Organisation (ISO)
Standards
Criminal Justice System: Data Standards Forum Guidance
An agreed and designed common data standards are used by the Criminal Justice System, ICT suppliers to support ICT communications between systems used by Criminal Justice Organisations (CJO) to...
Standard
|
Published:
17/12/2020
|
Authoring body:
Ministry of Justice (MOJ)
Guidance
Security Policy Framework for HMG Organisations
This Framework describes the Cabinet Secretary and Official Committee on Security expectations of how HMG organisations and third parties handling HMG information and other assets will apply...
Standard
|
Published:
01/01/2018
|
Authoring body:
Government Digital Service (GDS)
Policy
Domain-based Message Authentication, Reporting & Conformance (DMARC)
The Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email standard that used in email transactional activity. It helps validates a senders identity using Sender...
Standard
|
Published:
01/01/2016
|
Authoring body:
Government Digital Service (GDS)
Standards
Securing Government Email
This guidance applies to all email domains that public sector organisations run on the internet. It also helps ensures that public sector organisations exchanges email securely with other public...
Standard
|
Published:
01/01/2019
|
Authoring body:
Government Digital Service (GDS)
Guidance
DomainKeys Identified Mail (DKIM)
DomainKeys Identified Mail (DKIM) verifies an email’s domain and ensures it has not been tampered with in transit. The receiving email service can then filter or reject email that fails...
Standard
|
Published:
01/01/2016
|
Authoring body:
Government Digital Service (GDS)
Guidance
Encoding Characters
UTF-8, an encoding form for Unicode character sets, for government digital services and technology encodes all Unicode characters without changing the ASCII code. Unicode is based...
Standard
|
Published:
01/01/2020
|
Authoring body:
Government Digital Service (GDS)
Policy
Technology Code of Practice
The Technology Code of Practice is a set of criteria to help government design, build and buy technology. Technology Code of Practice should be used for all technology projects and programmes and...
Standard
|
Published:
01/01/2019
|
Authoring body:
Government Digital Service (GDS)
Guidance
Surveillance Camera Code of Practice
The purpose of the code will be to ensure that individuals and wider communities have confidence that surveillance cameras are deployed to protect and support them, rather than spy on them. ...
Standard
|
Published:
01/06/2013
|
Authoring body:
Home Office
Policy
Auditing Principles - Directive 2006/43/EC of the European Parliament and of the Council
Statutory auditors should adhere to the highest ethical standards and should be subject to professional ethics. This Directive aims at high-level to bring about harmonisation of statutory audit...
Standard
|
Published:
01/01/2006
|
Authoring body:
European Parliament
Principles
Criminal Intelligence Manual for Analysts
Intelligence is information (raw data) worked, evaluated in context to its source and reliability to create added value and meaning to its user (Information + Evaluation = Intelligence). Analysis...
Standard
|
Published:
01/01/2011
|
Authoring body:
United Nations Office on Drugs and Crime (UNODC)
Guidance
40 Entries
Per Page
4
Entries per Page
8
Entries per Page
20
Entries per Page
40
Entries per Page
60
Entries per Page
Showing 201 to 240 of 279 entries.
Page
1
...
Intermediate Pages Use TAB to navigate.
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Hidden